[go: up one dir, main page]

WO2004055653A3 - Procede de protection d'un logiciel contre des attaques utilisant des debogueurs - Google Patents

Procede de protection d'un logiciel contre des attaques utilisant des debogueurs Download PDF

Info

Publication number
WO2004055653A3
WO2004055653A3 PCT/US2003/036311 US0336311W WO2004055653A3 WO 2004055653 A3 WO2004055653 A3 WO 2004055653A3 US 0336311 W US0336311 W US 0336311W WO 2004055653 A3 WO2004055653 A3 WO 2004055653A3
Authority
WO
WIPO (PCT)
Prior art keywords
processing
agent
agents
result
combined
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/US2003/036311
Other languages
English (en)
Other versions
WO2004055653A2 (fr
Inventor
Lewis Rothrock
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Priority to AU2003291533A priority Critical patent/AU2003291533A1/en
Priority to HK05108566.2A priority patent/HK1075510B/xx
Priority to DE10393807T priority patent/DE10393807B4/de
Priority to GB0510775A priority patent/GB2412206B/en
Publication of WO2004055653A2 publication Critical patent/WO2004055653A2/fr
Publication of WO2004055653A3 publication Critical patent/WO2004055653A3/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Debugging And Monitoring (AREA)
  • Storage Device Security (AREA)

Abstract

Selon l'invention, une attaque contre un programme d'application infalsifiable peut être avortée par un procédé qui consiste à: charger une pluralité d'agents et démarrer une pluralité d'unités d'exécution de traitement, chaque unité d'exécution exécutant un des agents; exécuter simultanément chaque agent de manière sensiblement parallèle pour produire un résultat de traitement pour chaque agent destiné à répéter une étape de traitement de protocole; stocker chaque résultat du traitement dans une entrée d'un tampon associé à chaque agent; et recommencer les opérations d'exécution et de stockage pour de multiple itérations du traitement de protocole. Lorsqu'un des agents stocke un résultat du traitement dans une dernière entrée du tampon de l'agent, les résultats du traitement issus des premières entrées placées dans le tampon sont combinés pour produire un résultat combiné, et si le résultat combiné indique une erreur, une sémantique des défaillances peut être exécutée.
PCT/US2003/036311 2002-12-12 2003-11-12 Procede de protection d'un logiciel contre des attaques utilisant des debogueurs Ceased WO2004055653A2 (fr)

Priority Applications (4)

Application Number Priority Date Filing Date Title
AU2003291533A AU2003291533A1 (en) 2002-12-12 2003-11-12 Method of defending software from debugger attacks
HK05108566.2A HK1075510B (en) 2002-12-12 2003-11-12 Method of defending software from debugger attacks
DE10393807T DE10393807B4 (de) 2002-12-12 2003-11-12 Verfahren zum Schutz von Software vor Debugger-Angriffen
GB0510775A GB2412206B (en) 2002-12-12 2003-11-12 Method of defending software from debugger attacks

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/319,736 2002-12-12
US10/319,736 US7149900B2 (en) 2002-12-12 2002-12-12 Method of defending software from debugger attacks

Publications (2)

Publication Number Publication Date
WO2004055653A2 WO2004055653A2 (fr) 2004-07-01
WO2004055653A3 true WO2004055653A3 (fr) 2004-09-23

Family

ID=32506692

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/036311 Ceased WO2004055653A2 (fr) 2002-12-12 2003-11-12 Procede de protection d'un logiciel contre des attaques utilisant des debogueurs

Country Status (5)

Country Link
US (1) US7149900B2 (fr)
AU (1) AU2003291533A1 (fr)
DE (1) DE10393807B4 (fr)
GB (1) GB2412206B (fr)
WO (1) WO2004055653A2 (fr)

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7584354B2 (en) * 2003-01-31 2009-09-01 Intel Corporation Implementing portable content protection to secure secrets
US7370319B2 (en) * 2003-02-11 2008-05-06 V.I. Laboratories, Inc. System and method for regulating execution of computer software
US8225290B2 (en) * 2003-02-11 2012-07-17 V. i. Laboratories, Inc. Systems and methods for regulating execution of computer software
US7792300B1 (en) * 2003-09-30 2010-09-07 Oracle America, Inc. Method and apparatus for re-encrypting data in a transaction-based secure storage system
US8234638B2 (en) 2004-12-28 2012-07-31 Hercules Software, Llc Creating a relatively unique environment for computing platforms
US8375369B2 (en) * 2005-04-26 2013-02-12 Apple Inc. Run-time code injection to perform checks
US7603707B2 (en) * 2005-06-30 2009-10-13 Intel Corporation Tamper-aware virtual TPM
US8443354B1 (en) * 2006-03-29 2013-05-14 Symantec Corporation Detecting new or modified portions of code
JP4048382B1 (ja) * 2006-09-01 2008-02-20 富士ゼロックス株式会社 情報処理システムおよびプログラム
US7720671B2 (en) * 2006-11-30 2010-05-18 Oracle America, Inc. Method and system for child-parent mechanism emulation via a general interface
US8356356B2 (en) * 2007-01-30 2013-01-15 Microsoft Corporation Anti-debugger comprising spatially and temporally separate detection and response portions
US8286138B2 (en) * 2007-01-30 2012-10-09 Microsoft Corporation Multi-threaded detection of a game software debugger
US8683438B2 (en) * 2007-11-28 2014-03-25 International Business Machines Corporation System, computer program product and method for comparative debugging
US8739133B2 (en) * 2007-12-21 2014-05-27 International Business Machines Corporation Multi-threaded debugger support
KR20100112131A (ko) * 2008-01-21 2010-10-18 소니 주식회사 정보 처리 장치, 디스크, 및 정보 처리 방법, 및 프로그램
US20100107245A1 (en) * 2008-10-29 2010-04-29 Microsoft Corporation Tamper-tolerant programs
US8359657B2 (en) * 2010-03-30 2013-01-22 Sandcastles Technology Inc. Method and apparatus for enabling secure distribution of digital content
CN103827881B (zh) * 2011-03-09 2017-12-12 爱迪德技术有限公司 用于设备操作系统中的动态平台安全的方法和系统
US20130014267A1 (en) * 2011-07-07 2013-01-10 Farrugia Augustin J Computer protocol generation and obfuscation
EP2831787B1 (fr) 2012-03-30 2020-07-08 Irdeto B.V. Procédé et système permettant de prévenir et de détecter des menaces de sécurité
US9767276B1 (en) 2014-08-26 2017-09-19 Amazon Technologies, Inc. Scanning kernel data structure characteristics
US9530007B1 (en) 2014-08-26 2016-12-27 Amazon Technologies, Inc. Identifying tamper-resistant characteristics for kernel data structures
US9575793B1 (en) 2014-08-26 2017-02-21 Amazon Technologies, Inc. Identifying kernel data structures
US9507621B1 (en) * 2014-08-26 2016-11-29 Amazon Technologies, Inc. Signature-based detection of kernel data structure modification
US9740593B2 (en) 2015-01-08 2017-08-22 International Business Machines Corporation Comparative program execution through control of two or more debug sessions to automatically determine execution differences
US11169869B1 (en) * 2020-07-08 2021-11-09 International Business Machines Corporation System kernel error identification and reporting
CN112637240B (zh) * 2020-12-31 2023-09-12 河南信大网御科技有限公司 拟态环境下协议报文防篡改方法、系统及可读存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999001815A1 (fr) * 1997-06-09 1999-01-14 Intertrust, Incorporated Techniques d'obscurcissement pour augmenter la securite de logiciels
US6178509B1 (en) * 1996-06-13 2001-01-23 Intel Corporation Tamper resistant methods and apparatus
US20020049909A1 (en) * 2000-03-08 2002-04-25 Shuffle Master Encryption in a secure computerized gaming system
US20020166085A1 (en) * 2001-05-02 2002-11-07 Cyrus Peikari Self-optimizing the diagnosis of data processing systems by flexible multitasking

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6205550B1 (en) * 1996-06-13 2001-03-20 Intel Corporation Tamper resistant methods and apparatus
US5892899A (en) * 1996-06-13 1999-04-06 Intel Corporation Tamper resistant methods and apparatus
US6105137A (en) * 1998-07-02 2000-08-15 Intel Corporation Method and apparatus for integrity verification, authentication, and secure linkage of software modules
US6330670B1 (en) * 1998-10-26 2001-12-11 Microsoft Corporation Digital rights management operating system
US6535905B1 (en) * 1999-04-29 2003-03-18 Intel Corporation Method and apparatus for thread switching within a multithreaded processor
AU2001272886A1 (en) * 2000-10-11 2002-04-22 Trustcopy Pte Ltd. Remote printing of secure and/or authenticated documents

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6178509B1 (en) * 1996-06-13 2001-01-23 Intel Corporation Tamper resistant methods and apparatus
WO1999001815A1 (fr) * 1997-06-09 1999-01-14 Intertrust, Incorporated Techniques d'obscurcissement pour augmenter la securite de logiciels
US20020049909A1 (en) * 2000-03-08 2002-04-25 Shuffle Master Encryption in a secure computerized gaming system
US20020166085A1 (en) * 2001-05-02 2002-11-07 Cyrus Peikari Self-optimizing the diagnosis of data processing systems by flexible multitasking

Also Published As

Publication number Publication date
GB2412206B (en) 2006-03-29
DE10393807B4 (de) 2006-05-24
AU2003291533A1 (en) 2004-07-09
HK1075510A1 (en) 2005-12-16
US7149900B2 (en) 2006-12-12
DE10393807T5 (de) 2005-10-20
WO2004055653A2 (fr) 2004-07-01
US20040117620A1 (en) 2004-06-17
GB0510775D0 (en) 2005-06-29
GB2412206A (en) 2005-09-21

Similar Documents

Publication Publication Date Title
WO2004055653A3 (fr) Procede de protection d'un logiciel contre des attaques utilisant des debogueurs
US8861524B2 (en) Method for TCAM lookup using a key in multi-threaded packet processors
US20060212426A1 (en) Efficient CAM-based techniques to perform string searches in packet payloads
US8898645B2 (en) Handling breakpoints in an asynchronous debug model
WO2006006084A8 (fr) Etablissement de controle de commandes dans une file de commandes d'acces direct en memoire hors service
WO2005050445A3 (fr) Appareil et methode associes a un compilateur automatique de separation de processus
WO2006032524A3 (fr) Partage de classes et de chargeurs de classes
Charikar et al. Fully dynamic almost-maximal matching: Breaking the polynomial worst-case time barrier
Chu et al. Precise cache timing analysis via symbolic execution
US7660985B2 (en) Program security through stack segregation
EP1594061A3 (fr) Méthodes et systèmes pour grouper et administrer les instructions de mémoire
CN106295258A (zh) 用于多线程后向控制流完整性保护的影子栈实现方法
WO2006107574A3 (fr) Attribution de ressources a des articles, et notamment de contextes de traitement pour le traitement de paquets
WO2001093029A3 (fr) Procede et dispositif servant a faciliter la prediction de valeurs afin de supporter l'execution d'un programme speculatif
US9152423B2 (en) Method and apparatus for efficient loop instruction execution using bit vector scanning
US10248814B2 (en) Memory integrity monitoring
CA2533741A1 (fr) Repartition retardee programmable dans un pipeline multifilete
Ye et al. A reliable return address stack: Microarchitectural features to defeat stack smashing
Chappell et al. Microarchitectural support for precomputation microthreads
WO2006013279A3 (fr) Procede de partage de temps d'un processeur
Banerjee et al. A value propagation based equivalence checking method for verification of code motion techniques
Mittermayr et al. Timing analysis of concurrent programs
CA2622833A1 (fr) Serveur de courrier electronique effectuant le traitement de taches de courriers electroniques pour un utilisateur donne et procede associe
Vespa et al. Gpep: Graphics processing enhanced pattern-matching for high-performance deep packet inspection
US7558948B2 (en) Method for providing zero overhead looping using carry chain masking

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
ENP Entry into the national phase

Ref document number: 0510775

Country of ref document: GB

Kind code of ref document: A

Free format text: PCT FILING DATE = 20031112

RET De translation (de og part 6b)

Ref document number: 10393807

Country of ref document: DE

Date of ref document: 20051020

Kind code of ref document: P

WWE Wipo information: entry into national phase

Ref document number: 10393807

Country of ref document: DE

122 Ep: pct application non-entry in european phase
REG Reference to national code

Ref country code: DE

Ref legal event code: 8607

NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Ref document number: JP